CVE-2019-17398

9.8 CRITICAL

📋 TL;DR

The Dark Horse Comics Android app version 1.3.21 stores authentication tokens (equivalent to username and password) in system logs during authentication. This allows attackers with physical access or malware on the device to extract credentials via logcat. Only users of this specific Android app version are affected.

💻 Affected Systems

Products:
  • Dark Horse Comics
Versions: 1.3.21
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Android devices where the app is installed. Requires local access to device logs or malware presence.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full account access, potentially compromising payment information, personal data, and enabling account takeover across services if credentials are reused.

🟠

Likely Case

Local attackers or malware on the device extract authentication tokens to access the victim's Dark Horse Comics account, potentially exposing purchase history and personal information.

🟢

If Mitigated

With proper logging controls and app sandboxing, only privileged system users could access logs, significantly reducing exposure.

🌐 Internet-Facing: LOW - The vulnerability requires local access to device logs, not directly exploitable over the internet.
🏢 Internal Only: HIGH - Any malicious app or user with physical access to the device can exploit this vulnerability locally.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires running logcat commands on the device or having malware that can read system logs. No authentication needed to read logs if device is compromised.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 1.3.21

Vendor Advisory: No official advisory found

Restart Required: No

Instructions:

1. Open Google Play Store 2. Search for Dark Horse Comics 3. Update to latest version 4. Verify version is newer than 1.3.21

🔧 Temporary Workarounds

Disable debug logging

android

Prevent sensitive data from being written to logs

adb shell setprop log.tag.DarkHorseComics ERROR

Revoke app permissions

android

Limit app access to sensitive data

Go to Settings > Apps > Dark Horse Comics > Permissions > Disable all permissions

🧯 If You Can't Patch

  • Uninstall the vulnerable app version immediately
  • Monitor for suspicious account activity and change passwords if compromised

🔍 How to Verify

Check if Vulnerable:

Check app version in Google Play Store or Settings > Apps > Dark Horse Comics. If version is 1.3.21, you are vulnerable.

Check Version:

adb shell dumpsys package com.darkhorse.comics | grep versionName

Verify Fix Applied:

Update app and check that authentication tokens no longer appear in logs: adb logcat | grep -i 'token\|auth\|password'

📡 Detection & Monitoring

Log Indicators:

  • Authentication tokens, passwords, or sensitive credentials in logcat output
  • Log entries containing 'token=', 'auth=', 'password=' from Dark Horse Comics app

Network Indicators:

  • Unusual authentication attempts from new devices
  • Multiple failed login attempts followed by successful login

SIEM Query:

source="android_logs" app="Dark Horse Comics" (token OR auth OR password) AND severity="DEBUG"

🔗 References

📤 Share & Export